The Enigma Protector 6.30 Build 20180704
The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files (exe, src, dll, ocx, bpl, etc.) and .NET files created using various development tools, such as MS Visual Studio C#/C++/VB/VB.NET, Borland Delphi/C++, FreePascal, MASM, TASM and others. The protected files can be run on all versions of Windows 95/98/ME/2000/XP/2003/Vista/2008/Seven and Windows 10.
We just released new versions of the popular software protection and virtualization tools, which features are well known by you. However, the current update has some critical changes in the core of Virtual Box feature (the features that allows to embed files into single protected executable).
So, what are these changes?
– the overall speed of packed application. There are high improvements of the algorithm that works for files/registry open operations. If you ever noticed that your application becomes rather slower after protection, we recommend to upgrade to newest version
– the launching speed of packed applications. The launching speed was improved in times, especially for applications that include thousands files in Virtual Box. Symptoms of previous versions – much time between you click to run the application and when it finally executed.
– during continuous improvement of the Virtual Box core, we have fixed some other problems that caused unexpected behavior of packed application under specific versions of Windows.
6.30 Build 20180704
– Fixed problem with Volume Name hardware lock with unicode volume names
– Improved processing of relocation directory for specific files
– Accept drag and drop for input file
– Virtual Box: Major changes to improve speed of Virtual Box
– Virtual Box: Added drive exists detection for packages
– Virtual Box: Added option to hide virtual files from file open/save dialogs
The Enigma Protector will make your software resistant to cracking, and thus will increase your sales. The use of attack-proof cryptoalgorithms for registration key generation will make it impossible for others to reconstruct or reproduce the registration key generator for your software. Various methods of code obfuscation, mutation and virtualization will help protect your application from hacking, modifying, disassembling, illegal retrieval of unique functions and data, etc.
The “Try Before Buy” Concept
Trial limitations restrict functioning of the application to a certain period of time and once it is expired, the program has to be either uninstalled from the computer or registered (purchased). The Enigma Protector allows you to limit the number of application launches and the number of days that the application can be used since the first launch, to specify the dates of the first and last launch, as well as the time of each run.
License Manager and Mailer
License Manager allows you to store and process purchase orders, to generate registration keys and store various customer records in a database. The Mailer allows generating and sending template-based e-mails (for example, messages about a purchase made or a new version available) to registered users. The tools have a user-friendly and simple interface and a wide range of unique features.
Virtual Box Technology
The unique technology offers a possibility to consolidate the files used by your application into a single module without loss of efficiency. This function supports all kinds of files dll, ocx, mp3, avi, etc. Virtual Box will protect your files, and will prevent them from being copied and used in third-party products.
The most powerful and sophisticated mechanism for executable files protection. When a secure module is run, part of the program and protection code is translated (decompiled) into the so-called PCODE (a programming language which can only be read by the Enigma Protector) and the decompiled code is executed in its own virtual processor. Comprehension of such a code is almost impossible, not to mention its modification.
The scheme where a license key is provided to a registered user is often used upon selling software over the Internet. The Enigma Protector suggests flexibility in the integration of a license verification system based on cryptographically strong asymmetric algorithms into software and license (registration key) generation systems. Here, strong means that the complexity of algorithms used for registration key generation is comparable to the RSA algorithm with the key length up to 4096 bits. Many programmers make a mistake trying to implement algorithms for license validation and generation themselves, or misuse the ready-made solutions. This allows hackers to create their own license generators (key generators), which surely does not stimulate sales. The Enigma Protector will eliminate these threats as no one except yourself will be able to generate licenses for your applications. A registration key generation system can be easily embedded into automated registration systems such as ShareIt!, RegNow, Plimus, and others. Furthermore, the Enigma Protector can restrict the use of a license to a particular computer through adding information about the user’s computer into the registration key. These registration keys will only work on one specific computer.
In addition to limiting (binding) the license to a specific computer, you can limit the license use to certain dates, and specify the number of launches of a registered application or the number of days it can be used. Besides, you can restrict the total term of the license on a specific computer to several hours or minutes since the first launch of the protected file. There is also a possibility to limit the use of a license for a specific country.
You can verify registration keys in your application by means of special Enigma API functions that can be used in virtually any programming language (C++, Delphi, Visual Basic, etc.). Even if you cannot make changes to the source code, you can use a standard Enigma Protector registration dialog. The registration dialog features a flexible and user-friendly editor which lets you change any settings and styles of the dialogue to give it a unique design or the one of the main application.
The key generator for your application can be exported into a separate executable file. You can use CGI web key generators (for your own php/.net shells) or the License Manager system to store registration and user information. Moreover, in case you need to create your own shell for the key generator, the Enigma Protector includes binary libraries for generation of registration keys via Windows x86/x64 and Linux applications.
Protection of executable code from analysis and modification
When we say an application is cracked, it means that some data inside it have been modified so that the functionality of the program has changed. Usually is affects the executable code of the application. The Enigma Protector encrypts and compresses the executable code and application data so that changing them without destroying the protection turns impossible.
Not only does the Virtual Machine technology protect the executable and protection codes, but also it makes the process of analysis far more complicated (next to impossible). The essence of the Virtual Machine technology is that the executable code is translated into a special PCODE language which can be read only by the Enigma Protector, and is subsequently executed in the internal CPU emulator. The Virtual Machine generates different data in each instance of protection, and the decompiled algorithm for one Virtual Machine becomes useless for another one.
One of the major achievements in software protection against hacking is a closer integration of the protection functions with the executable code of the application. For this purpose, you can use special Enigma API functions that return the protection status and allow controlling numerous parameters, such as the license status, the trial period status, and much more.
When software is sold over the Internet, it is sometimes critical to show the full functionality of the product to the user, whereas limiting the use of a fully functional version to a certain period. This limit is called a trial period. At the end of the trial period, the user must either purchase the program (register) or remove it from their computer. The Enigma Protector allows you to automatically add the trial period function to your application and to choose from a variety of trial limitations, such as the number of launches, the number of days or the last date the application can be used, the number of minutes or hours since the first launch. The Enigma Protector monitors the system clock on the users computer so the user is not able to extend the trial period if the system clock is detected to have been set back, the program will automatically stop working.
To disable the trial period, the user will need to register the program, i.e. obtain a registration key from you.
You can control the parameters of the trial period within the application yourself using a specially designed system of Enigma API functions that will return information on the expired and remaining trial period.
A wide range of unique verification features
The Enigma Protector enables you to check whether a debugger is running (a debugger is a tool used to analyze the executable code of an application), control the integrity (checksum) of the file and the protection code, the number of running instances of an application (and limit the number of application copies that can be run simultaneously), check the file name, the type of media the protected file is launched from, and much more.
If your application is designed to support certain versions of Windows, the Enigma Protector can control this. To restrict the application launch, simply select the versions of Windows on which the protected application should not run.
Hackers often use software virtualization systems (such as VMWare, VirtualPC, VirtualBox, Sandboxie) to extend the trial period or to substitute the hardware data. To prevent the use of a protected file in these systems, the Enigma Protector suggests a feature that can check whether the application is run on a virtual machine.
A unique set of process monitoring and detection tools will allow you to configure the protection system to detect undesired or malicious processes running on the users computer. The process monitoring function helps find out what programs are running on the computer, if there are any hidden processes, etc. If your application uses any registry keys or data stored in files that should not be accessible for the user, you can use the function of detecting running processes and loaded drivers to configure the system so that it could detect such programs as RegMon (registry access monitor) or FileMon (file access monitor) and forbid the launch of the protected application if any of these programs are running.
The License Manager and Mail Delivery
The Enigma Protector allows you to store the generated registration keys and customer information in a separate database using the License Manager. Many developers face the problem of stolen or illegally used registration keys to their software. Using the License Manager, you can block a certain key and the program will no longer accept it.
The mail delivery system (Mailer) will help automatically create and send an e-mail to a registered user, or to submit e-mails to all users (e.g. updates on a new version release). You can create message text based on specific templates, and the Enigma Protector will generate messages for users and will automatically submit them.
Additional features implemented in the Enigma Protector allow adding your own resources, such as VERSION and MANIFEST, to a protected file. If your file takes much time to launch, you can use a screen saver which will be displayed to the user while the file is being loaded.
If you have your own tools to protect your application, you can use them alongside with Enigma Protector via the system of plugins. The system is based on the following principle: the dynamic library containing your implementation of security features will be built into the protected application, and certain functions will be called upon the launch of the protected file.
The Enigma Protector features the functions of application code and data compression and encryption. The compression of a file can reduce its size several times, and encryption helps protect the code from disassembling, analysis and modification.
Using the Watermark function, you can add any information into the protected file which will be available to any user or to you only. If your program is intended for use only within a particular group of users, and you realize that some user intentionally hands it over to others, the Watermark function will help you detect the unfair user.
[color=#006600]Online Activation Panel[/color]
The Online Activation Panel is a web-based solution for tracking and consolidating all incoming orders for your applications, automating and processing product registration or online activation if any. Each time your customer makes an order for your software product, the Online Activation Panel tracks and locates that order in its database, takes care of the product’s online activation or makes sure that the registration key is generated and submitted to the customer without any your attendance.
This is a comprehensive kit of order tracking features including order fulfillment, customer tracking and customer relationship management, online product activation, license key generation, automatic newsletter and e-mail submission, version and subscription management.
The Online Activation Panel will be extremely useful to software vendors and shareware developers who wish their order and customer management, as well as product registration/activation procedures were fully automated and unattended.How it works?
Online Activation Panel is integrating into payment processor system. Once the order has came and approved, registrar calls Online Activation Panel. Order is being saved to the database, the new customer record is creating and customer is being notified by email about successful order processing and license information, such as Activation ID. Customer downloads the protected program and runs it. If the program is not yet activated, customer will be asked to enter Activation ID, connect to the internet and activate. While activation, program connects to the Online Activation Panel and checks if the Activation ID exists in the database. If conditions are passed, Online Activation Panel generates a registration name and key based on the hardware equipment of the customer computer and sends this registration information back to program. Program registers and continues to work.Main Benefits
– Automatic tracking of all incoming orders from registrars (such as Shareit, Avangate, Regnow, Plimus)
– Complete order management, including handling stolen and refunded orders, adding orders to the order database manually, etc.
– Automatically processed online activation
– License key generation upon online activation or product registration
– Customer tracking and customer relationship management
– Customized client web interface with product news and downloads
– Product and version management
– Customer subscription management (expiry terms, access to version updates and downloads, etc.)
– Bulk newsletter and e-mail submission
Online activation is an automatic registration of an application via internet.
Normally, the majority of software applications use a registration scheme in which a user is required to enter the registration name and registration key. If a software developer wants to restrict the use of a license to a single computer, the scheme gets complicated due to a unique user hardware identifier involved (Hardware ID). In this case, the registration is performed as follows:
– A user runs the application that shows the Hardware ID. The user submits the Hardware ID to the developer via e-mail, fax, etc.
– Based on the user name and their Hardware ID, the developer creates a registration key and sends it back to the user.
– The user enters the registration name and key into the program and registers it.
To automate this registration scheme, online activation is used. In case of online activation, the following takes place:
– A user runs the protected application, enters a short activation number (that the user received when purchasing the program) and clicks Activate.
– The program automatically connects to the Control Panel via internet. Depending on the user name specified in the order and the unique Hardware ID, the Control Panel creates a registration key and sends it back to the program.
– The program is automatically registered.
Products, Customers and Orders Management
No matter where and how many products you are selling, all of them will be consolidated in Online Activation Panel. All orders from payment processor systems will come to Online Activation Panel.
Each customer is getting access to own account of the panel with the licensing content. Let customer to download the latest available version of software, take license information, handle subscriptions to new versions and license prolongation.
Block customer or order in case of chargeback, refund, or illegal use.
Notify customers about updates and news by sending bulk emails.Supported Payment Processors (registrars)
Online Activation Panel can be integrated with many payment processing systems. But if you did not find your registrar in the below list then you may contact to our support team and ask to review the registrar you are using to add it to activation panel. In any case, Online Activation Panel supports manual order processing too.
Registrars that are tested and supported by Online Activation Panel:
application, registration, Enigma, Protector, files, Virtual, program, Activation, license, executable, software, protected, customer, Panel, Online, protection, features, versions, activation, order, application, registration, Enigma, Protector, files, Activation, program, Virtual, license, Online, software, protected, customer, Panel, executable, protection, activation, features, computer, system